SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
Identifying Risks and Assessing Vulnerabilities
Analytics for Smart Grid Cybersecurity
This work was funded by the Cooperative Agreement between the Masdar Institute of Science and Technology (Masdar Institute), Abu Dhabi, UAE
and the Massachusetts Institute of Technology (MIT), Cambridge, MA, USA - 02/MI/MIT/CP/11/07633/GEN/G/00.
Nazli Choucri
Professor of Political Science
Gaurav Agarwal
SM - Engineering and Management ’10
Boston Global Citizenship Forum
Page 2
Source: United States Government Accountability Office, “Electricity grid
modernization, GAO-11-117, January 2011.
Analytics for Smart Grid Cybersecurity: Identifying Risks and Assessing Vulnerabilities
N Choucri and G Agarwal, September 22
Smart Grid of Power Systems
Highlights of Smart Grid Cybersecurity Risk Management Practice
Enterprise Risk
Management Practice
Cybersecurity Risk
Management Practice
Other Risk
Management Practice
NIST Supply Chain RMP
DoE RMP
Compliance to Technical
Standards
Compliance to Federal
Regulations
Implementation of
Capability Maturity Models
DoE C2M2 Guide
DoE C2M2
NIST Cybersecurity
Framework
White House Executive
Order: 13636
NIST 7628 Guidelines
NIST 800:53
NIST 1108R3
CIM/61850 for DGM
SGIP Framework
mapping to Guidelines
US CERT Cyber Resilience Review
ICS CERT Cyber Security Evaluation Tool
Primary Documents
Supporting
Documents
Other Documents
Focus on
Smart Grid
①
②
③
④
⑤
⑥
Advancing Cybersecurity and Sustainability for Critical Infrastructure: Ecosystem
of Cybersecurity Risk Management Practices – Situating NIST Initiatives and
Expanding Capabilities. • April 17, 2016
Page 3
Smart Grid Cyber
Security Focus
RMP stands for Risk Management Practice
Page 4
Smart Grid Elements – in numbers
Domains : 7
Actors (Nodes) : 47
Logical Interfaces (Edges) : 130
Security Requirements Types: 180
Vulnerabilities Classes: 53
Spatial distance between nodes is importance and
distance to other nodes.
Node represents an actor.
Node color based on domain.
Node size based on eigenvector centrality of node in the network.
Edge represents a logical interface (or connection) between two actors.
Interface strength – illustrated by thickness of connection
Impact scale and scope, defined in system-wide terms – represented by edge color.
•
Network View of NIST Guidelines from Design Structure Matrix (DSM)
Analytics for Smart Grid Cybersecurity: Identifying Risks and Assessing Vulnerabilities
N Choucri and G Agarwal September 22, 2016
Page 5
HIGHMODERATELOW
ConfidentialityIntegrityAvailability
SecurityObjectives
Impact Levels
Analytics for Smart Grid Cybersecurity: Identifying Risks and Assessing Vulnerabilities •
N Choucri and G Agarwal, September 22,, 2016
These images: (1) provide greater transparency, (2) identify high threat areas,
(3) support selection of priority actions, and (4) help align resources to goals
Risk Identification and Assessment based on NIST Guidelines 7628 R1

Weitere ähnliche Inhalte

Was ist angesagt?

Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure Program
EnergySec
 
Substation Cyber Security
Substation Cyber SecuritySubstation Cyber Security
Substation Cyber Security
Schneider Electric
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
George Wainblat
 

Was ist angesagt? (20)

Smart Grid Security - Attack & Defense
Smart Grid Security - Attack & Defense Smart Grid Security - Attack & Defense
Smart Grid Security - Attack & Defense
 
Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodSmart Grid Security by Falgun Rathod
Smart Grid Security by Falgun Rathod
 
Cyber security of smart grid communication: Risk analysis and experimental te...
Cyber security of smart grid communication: Risk analysis and experimental te...Cyber security of smart grid communication: Risk analysis and experimental te...
Cyber security of smart grid communication: Risk analysis and experimental te...
 
Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids
 
Cyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control SystemsCyber-Defensive Architecture for Networked Industrial Control Systems
Cyber-Defensive Architecture for Networked Industrial Control Systems
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
1678 1683
1678 16831678 1683
1678 1683
 
Cyber security of power grid
Cyber security of power gridCyber security of power grid
Cyber security of power grid
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on Utilities
 
How I Learned To Stop Worrying And Love the Smart Meter
How I Learned To Stop Worrying And Love the Smart MeterHow I Learned To Stop Worrying And Love the Smart Meter
How I Learned To Stop Worrying And Love the Smart Meter
 
Utilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA NetworksUtilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA Networks
 
Practical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart gridsPractical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart grids
 
Encryption Security in SCADA Networks
Encryption Security in SCADA NetworksEncryption Security in SCADA Networks
Encryption Security in SCADA Networks
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure Program
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
 
Lessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy SectorLessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy Sector
 
Substation Cyber Security
Substation Cyber SecuritySubstation Cyber Security
Substation Cyber Security
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
 
A Defense-in-depth Cybersecurity for Smart Substations
A Defense-in-depth Cybersecurity for Smart SubstationsA Defense-in-depth Cybersecurity for Smart Substations
A Defense-in-depth Cybersecurity for Smart Substations
 

Andere mochten auch

Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
Zsolt Nemeth
 
Problemas metodo simplex
Problemas metodo simplexProblemas metodo simplex
Problemas metodo simplex
LeidyEnriquez
 

Andere mochten auch (20)

BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
 
Cyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan CytrynCyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan Cytryn
 
BGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. Reef
BGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. ReefBGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. Reef
BGF-UNESCO-at-UCLA conference - Cyber security Incidents by Rodman K. Reef
 
Detection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day ThreatsDetection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day Threats
 
Threats to the Grid | Cyber Challenges Impacting the Energy Sector
Threats to the Grid | Cyber Challenges Impacting the Energy Sector Threats to the Grid | Cyber Challenges Impacting the Energy Sector
Threats to the Grid | Cyber Challenges Impacting the Energy Sector
 
Cyber attacks in Ukraine
Cyber attacks in UkraineCyber attacks in Ukraine
Cyber attacks in Ukraine
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
 
Ht f42
Ht f42Ht f42
Ht f42
 
S4 krotofil afternoon_sesh_2017
S4 krotofil afternoon_sesh_2017S4 krotofil afternoon_sesh_2017
S4 krotofil afternoon_sesh_2017
 
BGF-UNESCO-at-UCLA conference - GCE in Cyber Civil Defense
BGF-UNESCO-at-UCLA conference - GCE in Cyber Civil DefenseBGF-UNESCO-at-UCLA conference - GCE in Cyber Civil Defense
BGF-UNESCO-at-UCLA conference - GCE in Cyber Civil Defense
 
Electricity retailing: location-based approach for quality customer experiences
Electricity retailing: location-based approach for quality customer experiencesElectricity retailing: location-based approach for quality customer experiences
Electricity retailing: location-based approach for quality customer experiences
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in Cyberspace
 
Lorena
LorenaLorena
Lorena
 
Competencias comunicativas
Competencias comunicativasCompetencias comunicativas
Competencias comunicativas
 
Problemas metodo simplex
Problemas metodo simplexProblemas metodo simplex
Problemas metodo simplex
 
Topes para llantas
Topes para llantasTopes para llantas
Topes para llantas
 
Dafwebkon 2017
Dafwebkon 2017Dafwebkon 2017
Dafwebkon 2017
 
Morning Panel: Framing Our Future: How can MIT be a game changing force for c...
Morning Panel: Framing Our Future: How can MIT be a game changing force for c...Morning Panel: Framing Our Future: How can MIT be a game changing force for c...
Morning Panel: Framing Our Future: How can MIT be a game changing force for c...
 
Working Session 1: Creating Game Changing Plans for MIT Campus Sustainability
Working Session 1: Creating Game Changing Plans for MIT Campus Sustainability  Working Session 1: Creating Game Changing Plans for MIT Campus Sustainability
Working Session 1: Creating Game Changing Plans for MIT Campus Sustainability
 
Welcoming Remarks: EVPT, Israel Ruiz
  Welcoming Remarks: EVPT, Israel Ruiz  Welcoming Remarks: EVPT, Israel Ruiz
Welcoming Remarks: EVPT, Israel Ruiz
 

Ähnlich wie Analytics for Smart Grid Cyber security

Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
IJCNCJournal
 
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
IJCNCJournal
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
IJTET Journal
 
Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...
IAESIJAI
 

Ähnlich wie Analytics for Smart Grid Cyber security (20)

Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...
 
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
 
Risk Assessment for Identifying Intrusion in Manet
Risk Assessment for Identifying Intrusion in ManetRisk Assessment for Identifying Intrusion in Manet
Risk Assessment for Identifying Intrusion in Manet
 
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTSACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
 
Actor Critic Approach based Anomaly Detection for Edge Computing Environments
Actor Critic Approach based Anomaly Detection for Edge Computing EnvironmentsActor Critic Approach based Anomaly Detection for Edge Computing Environments
Actor Critic Approach based Anomaly Detection for Edge Computing Environments
 
IRJET - Security and Privacy by IDS System
IRJET -  	  Security and Privacy by IDS SystemIRJET -  	  Security and Privacy by IDS System
IRJET - Security and Privacy by IDS System
 
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
 
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksPerformance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
 
Finding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for NetworkFinding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for Network
 
Top 10 Cited Network Security Research Articles 2021 - 2022
Top 10 Cited Network Security Research Articles 2021 - 2022Top 10 Cited Network Security Research Articles 2021 - 2022
Top 10 Cited Network Security Research Articles 2021 - 2022
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)International Journal of Wireless Networks Systems (IJWNS)
International Journal of Wireless Networks Systems (IJWNS)
 
Investigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetInvestigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manet
 
Application of neural network and PSO-SVM in intrusion detection of network
Application of neural network and PSO-SVM in intrusion detection of networkApplication of neural network and PSO-SVM in intrusion detection of network
Application of neural network and PSO-SVM in intrusion detection of network
 
Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...Hyperparameters optimization XGBoost for network intrusion detection using CS...
Hyperparameters optimization XGBoost for network intrusion detection using CS...
 

Mehr von Boston Global Forum

Dark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common Sense
Dark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common SenseDark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common Sense
Dark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common Sense
Boston Global Forum
 

Mehr von Boston Global Forum (20)

The Artificial Intelligence Chronicle – Open to feedback 3-6-2020
The Artificial Intelligence Chronicle – Open to feedback  3-6-2020The Artificial Intelligence Chronicle – Open to feedback  3-6-2020
The Artificial Intelligence Chronicle – Open to feedback 3-6-2020
 
Hunermund causal inference in ml and ai
Hunermund   causal inference in ml and aiHunermund   causal inference in ml and ai
Hunermund causal inference in ml and ai
 
Dark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common Sense
Dark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common SenseDark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common Sense
Dark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common Sense
 
Generalizing Experimental Results by Leveraging Knowledge of Mechanisms
Generalizing Experimental Results by Leveraging Knowledge of MechanismsGeneralizing Experimental Results by Leveraging Knowledge of Mechanisms
Generalizing Experimental Results by Leveraging Knowledge of Mechanisms
 
Aiws presentation leeper rebecca
Aiws presentation leeper rebeccaAiws presentation leeper rebecca
Aiws presentation leeper rebecca
 
Marc Rotenberg AIWS
Marc Rotenberg AIWSMarc Rotenberg AIWS
Marc Rotenberg AIWS
 
MIT Trust Data Alliance building tomorrow’s smart city data systems
MIT Trust Data Alliance building tomorrow’s smart city data systemsMIT Trust Data Alliance building tomorrow’s smart city data systems
MIT Trust Data Alliance building tomorrow’s smart city data systems
 
COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
 
Professor Hiroshi ESAKI talks about Internet of Design
Professor Hiroshi ESAKI talks about Internet of DesignProfessor Hiroshi ESAKI talks about Internet of Design
Professor Hiroshi ESAKI talks about Internet of Design
 
Aiws united-nation charter day lecture
Aiws united-nation charter day lectureAiws united-nation charter day lecture
Aiws united-nation charter day lecture
 
Aiws g7 summit initiative - official april 25, 2019
Aiws g7 summit initiative - official april 25, 2019Aiws g7 summit initiative - official april 25, 2019
Aiws g7 summit initiative - official april 25, 2019
 
Agenda aiws g7 summit 2019
Agenda aiws g7 summit 2019Agenda aiws g7 summit 2019
Agenda aiws g7 summit 2019
 
Global citizenship education network reconciliation conference in tokyo on se...
Global citizenship education network reconciliation conference in tokyo on se...Global citizenship education network reconciliation conference in tokyo on se...
Global citizenship education network reconciliation conference in tokyo on se...
 
Catalog cho bgf g7 summit initaitive 2017
Catalog cho bgf  g7 summit initaitive 2017Catalog cho bgf  g7 summit initaitive 2017
Catalog cho bgf g7 summit initaitive 2017
 
The digital battle
The digital battleThe digital battle
The digital battle
 
Agenda of bgf g7 summit initiatve 2017
Agenda of bgf   g7 summit initiatve 2017Agenda of bgf   g7 summit initiatve 2017
Agenda of bgf g7 summit initiatve 2017
 
Stride gender
Stride genderStride gender
Stride gender
 
Second UNESCO Forum on Global Citizenship Education: Building Peaceful and Su...
Second UNESCO Forum on Global Citizenship Education: Building Peaceful and Su...Second UNESCO Forum on Global Citizenship Education: Building Peaceful and Su...
Second UNESCO Forum on Global Citizenship Education: Building Peaceful and Su...
 
Global Citizen Network
Global Citizen NetworkGlobal Citizen Network
Global Citizen Network
 
Education for people and planet: Creating sustainable futures for all
Education for people and planet: Creating sustainable futures for allEducation for people and planet: Creating sustainable futures for all
Education for people and planet: Creating sustainable futures for all
 

Kürzlich hochgeladen

"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Kürzlich hochgeladen (20)

Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 

Analytics for Smart Grid Cyber security

  • 1. Identifying Risks and Assessing Vulnerabilities Analytics for Smart Grid Cybersecurity This work was funded by the Cooperative Agreement between the Masdar Institute of Science and Technology (Masdar Institute), Abu Dhabi, UAE and the Massachusetts Institute of Technology (MIT), Cambridge, MA, USA - 02/MI/MIT/CP/11/07633/GEN/G/00. Nazli Choucri Professor of Political Science Gaurav Agarwal SM - Engineering and Management ’10 Boston Global Citizenship Forum
  • 2. Page 2 Source: United States Government Accountability Office, “Electricity grid modernization, GAO-11-117, January 2011. Analytics for Smart Grid Cybersecurity: Identifying Risks and Assessing Vulnerabilities N Choucri and G Agarwal, September 22 Smart Grid of Power Systems
  • 3. Highlights of Smart Grid Cybersecurity Risk Management Practice Enterprise Risk Management Practice Cybersecurity Risk Management Practice Other Risk Management Practice NIST Supply Chain RMP DoE RMP Compliance to Technical Standards Compliance to Federal Regulations Implementation of Capability Maturity Models DoE C2M2 Guide DoE C2M2 NIST Cybersecurity Framework White House Executive Order: 13636 NIST 7628 Guidelines NIST 800:53 NIST 1108R3 CIM/61850 for DGM SGIP Framework mapping to Guidelines US CERT Cyber Resilience Review ICS CERT Cyber Security Evaluation Tool Primary Documents Supporting Documents Other Documents Focus on Smart Grid ① ② ③ ④ ⑤ ⑥ Advancing Cybersecurity and Sustainability for Critical Infrastructure: Ecosystem of Cybersecurity Risk Management Practices – Situating NIST Initiatives and Expanding Capabilities. • April 17, 2016 Page 3 Smart Grid Cyber Security Focus RMP stands for Risk Management Practice
  • 4. Page 4 Smart Grid Elements – in numbers Domains : 7 Actors (Nodes) : 47 Logical Interfaces (Edges) : 130 Security Requirements Types: 180 Vulnerabilities Classes: 53 Spatial distance between nodes is importance and distance to other nodes. Node represents an actor. Node color based on domain. Node size based on eigenvector centrality of node in the network. Edge represents a logical interface (or connection) between two actors. Interface strength – illustrated by thickness of connection Impact scale and scope, defined in system-wide terms – represented by edge color. • Network View of NIST Guidelines from Design Structure Matrix (DSM) Analytics for Smart Grid Cybersecurity: Identifying Risks and Assessing Vulnerabilities N Choucri and G Agarwal September 22, 2016
  • 5. Page 5 HIGHMODERATELOW ConfidentialityIntegrityAvailability SecurityObjectives Impact Levels Analytics for Smart Grid Cybersecurity: Identifying Risks and Assessing Vulnerabilities • N Choucri and G Agarwal, September 22,, 2016 These images: (1) provide greater transparency, (2) identify high threat areas, (3) support selection of priority actions, and (4) help align resources to goals Risk Identification and Assessment based on NIST Guidelines 7628 R1